Beruflich Dokumente
Kultur Dokumente
Question 1
2 / 2 pts
What is the name of the method in which letters are rearranged to create the ciphertext?
substitution
Correct!
transposition
one-time pad
enigma
One-time pad – plaintext combined with a secret key creates a new character, which then combines with
the plaintext to produce ciphertext
Question 2
2 / 2 pts
Which term describes the technology that protects software from unauthorized access or modification?
copyright
Correct!
watermarking
trademark
access control
Software watermarking inserts a secret message into the program as proof of ownership and protects
software from unauthorized access or modification.
Question 3
2 / 2 pts
What type of cipher encrypts plaintext one byte or one bit at a time?
elliptical
block
hash
enigma
Correct!
stream
Stream ciphers encrypt plaintext one byte or one bit at a time, and can be much faster than block
ciphers.
Question 4
2 / 2 pts
Correct!
Correct!
hiring practices
Correct!
background checks
encryption
guard dogs
Administrative access controls are defined by organizations to implement and enforce all aspects of
controlling unauthorized access and include the following:
Policies
Procedures
Hiring practices
Background checks
Data classification
Security training
Reviews
Question 5
2 / 2 pts
What is the term used to describe the science of making and breaking secret codes?
impersonation
factorization
spoofing
Correct!
cryptology
jamming
Cryptology is the science of making and breaking codes to make sure that cyber criminals cannot easily
compromise protected information.
Question 6
2 / 2 pts
What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?
one-time pad
asymmetric
hash
Correct!
symmetric
Symmetric encryption algorithms use the same pre-shared key to encrypt and decrypt data.
Question 7
2 / 2 pts
A warning banner that lists the negative outcomes of breaking company policy is displayed each time a
computer user logs in to the machine. What type of access control is implemented?
detective
preventive
masking
Correct!
deterrent
Deterrents are implemented to discourage or mitigate an action or the behavior of a malicious person.
Question 8
2 / 2 pts
What encryption algorithm uses one key to encrypt data and a different key to decrypt data?
one-time pad
Correct!
asymmetric
symmetric
transposition
Asymmetric encryption uses one key to encrypt data and a different key to decrypt data.
Question 9
2 / 2 pts
Which asymmetric algorithm provides an electronic key exchange method to share the secret key?
hashing
RSA
DES
WEP
Correct!
Diffie-Hellman
Diffie-Hellman provides an electronic exchange method to share a secret key and is used by multiple
secure protocols.
Question 10
2 / 2 pts
Which three processes are examples of logical access controls? (Choose three.)
Correct!
Correct!
Correct!
Smart cards
Passwords
Biometrics
Protocols
Firewalls
Question 11
2 / 2 pts
Correct!
Correct!
Correct!
Telnet
Question 12
2 / 2 pts
Which two terms are used to describe cipher keys? (Choose two.)
key randomness
keylogging
Correct!
key length
Correct!
key space
Key length - Also called the key , this is the measure in bits.
Keyspace - This is the number of possibilities that a specific key length can generate.
Question 13
2 / 2 pts
Match the description with the correct term. (Not all targets are used.)
Correct!
steganography
Correct!
steganalysis
Correct!
social steganography
Correct!
obfuscation
Question 14
2 / 2 pts
What term is used to describe the technology that replaces sensitive information with a nonsensitive
version?
hiding
whiteout
Correct!
masking
retracting
blanking
Data masking replaces sensitive information with nonsensitive information. After replacement, the
nonsensitive version looks and acts like the original.
Question 15
2 / 2 pts
What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital
signature generation and key exchange?
RSA
IDEA
Correct!
ECC
El-Gamal
AES
Elliptic curve cryptography (ECC) uses elliptic curves as part of the algorithm for digital signature
generation and key exchange.
Question 16
2 / 2 pts
Which three devices represent examples of physical access controls? (Choose three.)
Correct!
locks
routers
Correct!
video cameras
Correct!
swipe cards
firewalls
servers
Physical access controls include but are not limited to the following:
Guards
Fences
Motion detectors
Laptop locks
Locked doors
Swipe cards
Guard dogs
Video cameras
Mantraps
Alarms
Question 17
2 / 2 pts
Which 128-bit block cipher encryption algorithm does the US government use to protect classified
information?
Vignere
Caesar
Skipjack
3DES
Correct!
AES
Question 18
2 / 2 pts
Which type of cipher is able to encrypt a fixed-length block of plaintext into a 128-bit block of ciphertext
at any one time?
symmetric
stream
hash
transform
Correct!
block
Block ciphers transform a fixed-length block of plaintext into a block of ciphertext. To decrypt the
ciphertext, the same secret key to encrypt is used in reverse.
Question 19
2 / 2 pts
What term is used to describe concealing data in another file such as a graphic, audio, or other text file?
obfuscation
Correct!
steganography
hiding
masking
Refer to curriculum topic: 4.3.2
Steganography conceals data in a file such as a graphic, audio, or other text file and is used to prevent
extra attention to the encrypted data because the data is not easily viewed.
Question 20
2 / 2 pts
Correct!
Correct!
a fingerprint scan
Correct!
a password
Multi-factor authentication uses a minimum of two methods of verification and can include the
following:
Time: 5 minutes
3 Attempts so far
View Previous Attempts
Unlimited Attempts